Cannot Access USB folder through cmd because of the credentials

Hi All,
Today i pluged my USB flash drive to my router and enabled media/file sharing on my router's USB settings. When i enter my gateway directory through cmd (win+r > \\192.168.1.1) it asked me for the credentials of my router and i entered. (admin / xxxxx) It was successful and i was able to see the contents of USB drive pluged on my router. Then i changed my routers password (admin/ yyyyy) but i cannot enter the \\192.168.1.1 location to see my files. How can i edit these credentials? Where is it kept? Thanks in advance.

Here is my error message(my win is not English so this is translated version);
Windows Cannot access to //192.168.1.1
You dont have permision to access //192.168.1.1 Contact your network administrator to request permission

It seems that after Creators update scheduled tasks run with elevated privileges ('run with highest privileges' option) can't access stored Windows credentials. Is that a bug or an intentional change and is there a recommended workaround?

Here's one way to reproduce the behaviour:

Start Credential Manger and add some Windows share credentials.

In a console window type 'cmdkey /list', which should list the added credentials

Create a task in a task manager:

Trigger: on user logon

Action: run cmd.exe

Tick the 'run with highest privileges' option

Reboot the machine and log in

In the console window (let's call it 'console 1') opened from the scheduled task type 'cmdkey /list'. This most likely won't display the credentials added in step 1 and properly listed in step 2. ->This looks like a bug

Now, without closing 'console 1' open another console window as an administrator (let's call it 'console 2') and type 'cmdkey /list'. This will properly list credentials added in step 1.

Switch to 'console 1' and type 'cmdkey /list' again. This time the credentials are listed properly, unlike in step 5. It looks like an access to Windows credentials was somehow 'unlocked' by step 6.

If you have heard about Credential Guard in Windows Server 2016 (and in Windows 10), but do not have an environment to try it out, here is a lab environment we built for you to play.

Lab access

The link will lead you to a sign up page, after that, you will see the following labs listed for Windows Server 2016:

Windows Server 2016 labs

There are 3 exercises in the “Implementing Breach Resistance Security in Windows Server 2016”:

Credential Guard

Remote Credential Guard

Device Guard

This blogpost will walk you through the Credential Guard lab details.

After click on the link of Breach Resistance lab, you be required to sign in and then you can launch the lab:

Sign-in

Launch page

It takes a few minutes to create the VMs, and once it has done, you will see the following machines prepared:

Initialize

DC: domain controller, which is not used for this exercise.

SRV01 and SRV02: both are Windows Server 2016, and used for the lab exercise.

Lab exercise – Explained

The steps are listed in the Content section:

Content

This lab is structured to cover the following in sequence:

Understand how attackers can use the hash in memory to gain access to domain controllers

Configure Credential Guard

Verify the hash in memory is protected using Credential Guard

You can follow the steps listed under the content section to complete the lab, the intent of the blog, is to break the procedures into groups, to help you understand the exercise better.

Prep the hash

Lsass.exe is the process which handles user logon, it stores the user credential information in its memory. The memory is cleared when the machine starts up. In this lab environment, all the virtual machines start at the time lab launches, when you logon to the machine, you will only have the logon user credential information in memory. In order to demonstrate an attacker gaining user access using other account’s hash, the first part of the lab is to simulate a server which has been running for a while, different users had remotely or locally connected to it, therefore, lsass memory stored many different user credential information.
This is accomplished by step 1-8.

Retrieving credential hash

Mimikatz is a popular tool for retrieving lsass memory information. The tool has been copied to the lab machines, step 9-13 walk you through the process of dumping lsass memory using Mimikatz.

Pass the Hash

Pass the hash is a hacking technique that allows an attacker to authenticate by using the underlying NTLM, instead of specifying the user password. In step 14 to 24, you will extract LabAdmin hash from lsass using Mimikatz, and use the hash to open a PowerShell console, and perform a couple of operations using the LabAdmin privilege:

Add a user to the domain admin group

Open remote PowerShell connection to a domain controller

Both operations could not be performed by the logon user. But using the hash of the LabAdmin, an attacker will be able to do it using the information retrieve from Lsass memory.

Configure and verify Credential Guard

Step 25 to 36 illustrate the steps to configure credential guard, then verify its status using msinfo32.exe and PowerShell.

Step 37 to 43 goes further to use Mimikatz to show the hash in Lsass is now encrypted using Credential Guard.

More info

The exercise illustrated the benefit of Credential Guard in Windows Server 2016 as well as Windows 10. For more information, you can find here.

Cannot Access USB folder through cmd because of the credentials

Network Credentials

Hi Sammy,

To assist you better regarding your concern with network credentials, have you checked the Windows credentials for any information about the username and password for the network credentials? If not yet, follow the steps below to access Windows Credentials
manager.

Cannot access some programs because of family restrictions: I removed myself from a Microsoft Family and tried to log into my Microsoft account on a new computer. Previously I was registered as a child but I currently cannot download some software because of the family restrictions. I double checked, I really removed myself from the...

cannot access the USB: I receive the message -you don’t currently have permission to access this folder- when I try to access the USB. I was recommended to open the security tab on this USB but I cannot find any security tab there....

Allow an app through Controled folder access: Hello
I am not sure what this image attached to this question is asking I.e I have no idea what app is being referr[ATTACH]ed to! I am not even sure what the 'Control folder' refers to! I was going to look it up like usual before posting but I have many things open...

Windows 10 cannot copy files through the private network. Destination folder access denied.: Well, as I said: Windows 10 cannot copy files through the private network. Destination folder access denied. You need permission to perform this action.
I have EVERYTHING as I had a few days ago (when this can be done):
Network discovery ON
File and printer sharing ON...

Cannot clear network access credentials: OS: Windows 10 x64
I access a network server using a username + password. I'd like to use another username+password, but I cannot clear the old credentials. What I've done until now:
there was nothing to delete in Windows credentials (Control Panel\All Control Panel...

Sharing folders - Credentials: Hello everyone!
I have a problem with sharing some folders.
On my PC I have set 3 folders to share. One for personal data and other two for sharing pictures and videos.
Folders with pictures and videos are shared that anyone on network can open the folder and browse...